首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
在存在恶意干扰者的四节点网络中,恶意干扰者通过发送相关干扰破坏合法通信。针对该安全问题,本文提出了一种源信号和结构性噪声联合发送的安全传输方法,其中,结构性噪声是指合法通信双方共享的结构性码字,它只干扰非合作节点,从而提高系统安全性能。具体步骤为,首先建立发送方和恶意干扰者之间以安全速率为目标函数的连续零和博弈模型;然后根据信道状态确定各自的策略集,并分析策略集对应的纳什均衡;最后利用均衡解指导发送方合理分配源信号和结构性噪声的功率。数值仿真表明所提方法下的安全速率比原有方案的要高。   相似文献   

2.
针对窃听方发送恶意导频干扰破坏系统安全性能的问题,本文将研究场景扩展到三节点MIMO(Multple-Input Multiple-Output)网络,首先分析存在恶意导频干扰时最小二乘和最小均方误差准则下的信道估计结果,并推导基于人工噪声的系统安全速率公式,得出当窃听方到达发送方的导频干扰功率大于合法接收方达到的功率时,安全速率值只能为零.然后,进一步分别研究半双工窃听方和全双工窃听方场景下的最优功率分配方案.最后,通过数值仿真分析窃听者位置、窃听者类型和干扰功率等因素对安全性能的影响.  相似文献   

3.
本文研究了高斯MISO窃听信道的可达保密速率问题.系统模型包括一个发送者,一个接收者和一个窃听者.发送者将发送功率分成两部分,一部分功率发送信号,一部分功率发送人工干扰信号.推导出了采用人工干扰时的系统可达保密速率公式,并通过优化信号功率和噪声功率的比例,最大化可达保密速率.仿真结果验证了本文提出的人工干扰策略的有效性.  相似文献   

4.
研究节点具备能量收集能力的中继窃听信道保密速率的优化问题,提出一种基于人工噪声协同干扰和节点间能量协同的物理层安全传输策略.各节点采用储能-发送模式工作,即先收集能量,再用于数据传输.中继节点采用放大转发方式,目的节点发送人工噪声进行协同干扰.由于中继节点所需功耗较高,目的节点将用于发送干扰之外的剩余能量转移给中继节点.给出以最大化保密速率为目标函数,优化能量吸收时间比例系数和干扰功率分配因子的两步优化算法.仿真结果表明人工噪声和能量协同的引入能有效提高系统的保密传输速率.  相似文献   

5.
该文研究节点具有能量收集能力的两跳中继系统的物理层安全传输方案。考虑窃听节点与源和中继节点间都有直接链路的情况。每个数据传输时隙分为能量收集和数据传输两个阶段,各节点用收集的能量发送信号。中继采用放大转发方式,目的节点发送人工噪声进行协作干扰,保护在两跳传输中传输的保密信息。以最大化保密速率为目标,采用迭代算法优化能量吸收和数据传输两阶段的时间分配比例系数和协作干扰功率分配因子。仿真结果表明优化算法准确,优化后的协作干扰方案能显著提高系统的保密传输速率。由于考虑了窃听节点在两跳传输中都能接收到信号的可能性,文中方案更贴近实际,并解决了一个复杂的优化问题。  相似文献   

6.
雷维嘉  王娟兵  谢显中 《电子学报》2018,46(12):2878-2887
研究大规模多输入多输出中继网络中的多用户物理层安全传输方案.系统模型中假设窃听节点与源节点和中继节点间都有直接链路,窃听节点可以接收到源节点和中继发送的信号.在不能获得窃听者信道状态信息的情况下,大规模MIMO中继采用简单的最大比合并/最大比发射信号处理方案,并配合中继零空间人工噪声和目的端的协作干扰实现多用户的信息安全传输.对保密速率及其在中继天线数无限增长时的渐近值进行了理论分析,并进行仿真.仿真结果显示系统的保密和速率随中继天线数的增长而增长,最终趋于理论渐近上界值.仿真结果也表明即使窃听节点具有多用户间干扰消除能力,并能同时拦截源节点和中继发送的信号,采用本文的方案仍然能获得可观保密速率.  相似文献   

7.
针对多输入多输出(Multiple-Input Multiple-Output,MIMO)无线通信系统传输过程中的安全问题,提出了一种基于人工噪声辅助的安全传输方法。首先,建立人工噪声辅助MIMO系统的信道状态矩阵;其次,将信道状态矩阵进行奇异值分解,设计合理的预编码和人工噪声矩阵,从而显著提升MIMO系统的安全性。对于窃听节点的译码采用最大似然检测译码。仿真结果表明,利用MIMO系统信道信息的零空间矩阵,采用人工噪声进行信号加密,有效提高了潜在窃听节点的误码率,当合法信道质量降低时,通过降低分配数据信号功率系数来提高MIMO无线系统的窃听误码率。  相似文献   

8.
雷维嘉  周洋 《电子学报》2020,48(6):1041-1051
研究多入多出(Multiple Input Multiple Output,MIMO)同时同频全双工双向通信系统中,合法节点在接收信息的同时向对方发送保密信息,并发送零空间人工噪声干扰窃听节点的物理层安全方案的优化问题.针对窃听信道状态信息仅统计分布已知,且存在残余自干扰的情况,首先推导出系统平均保密和速率的闭合表达式,进一步给出其下界.在此基础上,以最大化系统该下界为目标,对两节点的信息信号与人工噪声的功率分配因子、信息信号的功率分配矩阵进行联合优化.采用迭代的方法进行优化,每轮迭代中,先固定前者,优化后者,再固定后者,优化前者.使用DC(Difference of Concave/Convex,DC)规划优化信息信号功率分配矩阵,使用遗传算法优化信息信号与人工噪声的功率分配因子.对所提方案进行了仿真验证,证明理论推导正确,优化算法能有效地提高系统的平均保密和速率.  相似文献   

9.
为保证MIMO异构网络面临多天线主动窃听时的安全性,该文提出一种基于人工噪声的抗主动窃听者的鲁棒安全传输方案。首先,考虑窃听者发送上行导频干扰的情形,研究了其发送的上行导频干扰对合法用户信道估计的影响。随后,基于信道估计结果对宏基站、微基站的下行数据与噪声信号的预编码矩阵进行设计,并推导了此种情形下系统安全速率的表达式。然后,以系统安全速率最大化为目标对基站的下行数据与噪声信号的发送功率进行优化设计,并提出一种基于1维线性搜索的求解方法。进一步地,考虑窃听者在发送上行导频干扰后,继而发送噪声干扰用户下行通信的情形,提出一种基于离散零和博弈方法来获取最优的发送功率设计。仿真结果验证了所提方案的安全性和鲁棒性。  相似文献   

10.
在包含中继节点的D2D(Device-to-Device)系统中,针对蜂窝链路与D2D链路同时受窃听的问题,提出一种基于链路间干扰辅助的中继D2D系统安全通信方法.首先,确定蜂窝链路与D2D链路上下行发送模式;然后,在基站与中继节点的发送信号中添加人工噪声,协作干扰窃听者;最后,对基站功率分配与D2D功率控制进行了优化,以实现不同类型链路间干扰辅助保障系统安全.仿真结果表明,所提出的安全通信方法在保密速率方面比SVD(Singular Value Decomposition)与ZF(Zero-Forcing)预编码方法提高了1.5bit/s/Hz.  相似文献   

11.
本文研究了高斯正交中继窃听信道,中继节点同时作为窃听者的情况,源节点同中继节点和目的节点在信道1上传输信号,中继节点同目的节点在信道2上传输信号,信道1和信道2在频率上是正交的。通过分析,在总的信道资源受限的情况下,通过优化功率及信道带宽获得最大的安全速率。本文给出了在高斯正交信道下,当只考虑功率或带宽时,存在唯一的功率或带宽使得安全速率达到最大,并且通过仿真结果说明了采用最优资源分配可得到比等资源分配更大的安全速率。  相似文献   

12.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

13.
In this paper, we investigate the cooperative strategy with total power constraint in decode-and-forward (DF) relaying scenario, in the presence of an eavesdropper. Due to the difference of channel for each source-relay link, not all relay nodes have constructive impacts on the achievable secrecy rate. Besides, the final achieved secrecy rate depends on both source-relay and relay-destination links in DF relaying scenario. Therefore, the principal question here is how to select cooperative strategy among relays with proper power allocation to maximize the secrecy rate. Three strategies are considered in this paper. First, we investigate the cooperative jamming (CJ) strategy, where one relay with achieved target transmission rate is selected as a conventional relay forwarding signal, and remaining relays generate artificial noise via CJ strategy to disrupt the eavesdropper. Two CJ schemes with closed-form solutions, optimal cooperative jamming (OCJ) and null space cooperative jamming (NSCJ), are proposed. With these solutions, the corresponding power allocation is formulated as a geometric programming (GP) problem and solved efficiently by convex programming technique. Then, to exploit the cooperative diversity, we investigate the cooperative relaying (CR) strategy. An iterative algorithm using semi-definite programming (SDP) and GP together with bisection search method is proposed to optimize the cooperative relaying weight and power allocated to the source and relays. Furthermore, to exploit the advantages of both CR and CJ, we propose an adaptive strategy to enhance the security. Simulation results demonstrate that the efficiency of the proposed cooperative strategies in terms of secrecy rate.  相似文献   

14.
An artificial noise strategy is proposed for amplify‐and‐forward bi‐directional relay network where the eavesdropper can wiretap the relay channels in both hops. Artificial noise is used to confuse the eavesdropper and improve its secrecy. Specifically, the source and the relay are allowed to split their available transmit power into 2 parts: a useful information portion and a jamming portion to transmit a jamming signal. The mathematical model is established for 2‐way relay network with an eavesdropper. The secrecy rate achieved by using artificial jamming is derived from the above model. The optimal power allocation with individual power constraint is obtained via sequential quadratic programming to maximize the secrecy sum rate, and 2 special cases are investigated. Furthermore, the benchmark is provided for the purpose of performance comparison. Simulation results show that the proposed strategy can significantly improve the secrecy sum rate by using artificial noise to jam the eavesdropper.  相似文献   

15.
杨斌  王文杰  殷勤业 《电子学报》2016,44(2):268-274
中继系统可以增强物理层安全算法的系统性能,这种系统一般包含两阶段的通信过程:从信源到中继节点,在从中继节点到目的节点.通常来说,第一阶段的信息传输缺乏保护,如果窃听者距离信源节点比较近的话,系统性能就无法保证了.该文提出了一种基于混合信号的三阶段的传输方法确保整个传输过程中的保密性能,这样,当窃听者接近信源节点的时候,仍可以保证系统的安全性能.这种方法的优化解是一个复杂的非凸优化问题,该文中建议了一种低复杂度的次优解来解决其中的优化问题.理论分析以及方针结果证明,该方法可以有效确保系统的全过程的安全性能.  相似文献   

16.
In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.  相似文献   

17.
The characteristics of the wireless medium create difficulty to shield the data transmission from unauthorized recipients. In this paper, power optimization in an amplify-and-forward untrusted relay network is presented, using cooperative jamming transmission to prevent the untrusted relay from intercepting the confidential signals. Considering imperfect channel estimation error at the destination, an optimal power allocation (OPA) is designed to maximize the achievable secrecy rate for the network. Simplified OPA is derived for high signal-to-noise ratio regime with imperfect CSI and the ergodic secrecy rate is also analyzed to evaluate the achievable average secrecy rate for different scenarios as a common performance metric. The numerical results show that when the error of CSI is considered, the proposed OPA generates limited and acceptable degradation on the secrecy rate.  相似文献   

18.
针对多个与基站(BS, base station)无直达链路蜂窝边缘移动站(MS, mobile station)在上行链路具有保密信息传输需求且存在不信任中继(UR, untrusted relay)协作通信场景,引入目的节点(即BS)干扰机制,并研究MS固定传输功率下UR与BS功率分配以最大化系统安全速率问题。分析表明,该联合功率控制问题等价于联合接入控制与功率分配问题因而是NP-难。通过问题松弛,提出一种次优MS接入控制与基于交替优化的功率分配算法,并证明该次优算法具有多项式复杂度且至少收敛到原始问题一个次优解。仿真结果表明,所提次优算法相对于同场景各种参考算法在系统可达安全速率性能上有显著提高。  相似文献   

19.

This paper introduces the hybrid-decode-amplify-forward (HDAF) cooperative relaying into a control jamming aided NOMA network under Rayleigh-flat-fading channel conditions. In HDAF, the relay switches between AF and DF modes based on SNR threshold to forward the information signal to the corresponding NOMA users in the existence of an eavesdropper. We first characterize the secrecy performance of the considered network in terms of secrecy rate at both NOMA users analytically under different jamming scenarios. Further, to improve the secrecy rate, Differential Evolution (DE) algorithm-based power allocation is adopted to optimize the powers of jammer, relay, and NOMA users for which maximization of secrecy rate is chosen as the cost function. Moreover, the impact of different numerical parameters such as signal-to-noise ratio (SNR), jammer-to-eavesdropper distance, and relay-to-eavesdropper distance on the secrecy rate is investigated at both NOMA users by employing different jamming schemes. The MATLAB based simulation results validate the efficacy of proposed power allocation over fixed power allocation, CJ over other jamming schemes, and application of HDAF relaying for physical layer security enhancement of NOMA enabled cooperative network.

  相似文献   

20.
信息安全是影响物联网(IoT)应用的关键因素之一,物理层安全是解决物联网信息通信安全问题的有效技术。该文针对物联网中带有主动攻击的全双工窃听者,利用无人机(UAV)辅助发射人工噪声的方法,提升系统物理层安全性能。为了跟踪窃听者位置移动,首先采用贝叶斯测距和最小二乘法迭代估计窃听者位置,然后提出基于Q-learning的无人机轨迹优化算法,以达到在窃听者移动情况下系统保密性能最优。仿真结果表明,该算法能快速收敛,并且无人机能够跟踪窃听者移动来确定自身最佳位置,对窃听信道实施有效干扰,从而保证系统可达安全速率最大。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号